Which method for detecting certain types of attacks uses an algorithm to detect suspicious traffic, is resource intensive, and requires extensive tuning and maintenance?
A. brute force
B. heuristic
C. signature
D. anomaly
Answer: B
Computer Science & Information Technology
You might also like to view...
The OR function evaluates two conditions; if TRUE is displayed in the cell, ________ of the conditions must be true
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The ____ manager makes low-level decisions by following well-defined set of routine procedures
A. operational B. tactical C. strategic D. executive
Computer Science & Information Technology